Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
network monitor vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv3
CVE-2023-5624
Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.
Tenable Nessus Network Monitor
7.2
CVSSv3
CVE-2019-11074
A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows malicious users to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation whe...
Paessler Prtg Network Monitor
6.1
CVSSv3
CVE-2023-51630
Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote malicious users to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability...
Paessler Prtg Network Monitor
8.8
CVSSv3
CVE-2018-19204
PRTG Network Monitor prior to 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_...
Paessler Prtg Network Monitor
7.2
CVSSv3
CVE-2023-23842
The SolarWinds Network Configuration Manager was susceptible to the Directory Traversal Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands.
Solarwinds Network Configuration Monitor
6.5
CVSSv3
CVE-2015-7743
XML external entity vulnerability in PRTG Network Monitor prior to 16.2.23.3077/3078 allows remote authenticated users to read arbitrary files by creating a new HTTP XML/REST Value sensor that accesses a crafted XML file.
Paessler Prtg Network Monitor
7.2
CVSSv3
CVE-2019-11073
A Remote Code Execution vulnerability exists in PRTG Network Monitor prior to 19.4.54.1506 that allows malicious users to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote au...
Paessler Prtg Network Monitor
7.5
CVSSv3
CVE-2018-10253
Paessler PRTG Network Monitor prior to 18.1.39.1648 mishandles stack memory during unspecified API calls.
Paessler Prtg Network Monitor
1 EDB exploit
1 Github repository
7.5
CVSSv3
CVE-2018-19203
PRTG Network Monitor prior to 18.2.41.1652 allows remote unauthenticated malicious users to terminate the PRTG Core Server Service via a special HTTP request.
Paessler Prtg Network Monitor
9.8
CVSSv3
CVE-2018-19410
PRTG Network Monitor prior to 18.2.40.1683 allows remote unauthenticated malicious users to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /...
Paessler Prtg Network Monitor
2 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »